Login / Signup
Lossless Steganography Techniques for IP Telephony Speech Taking Account of the Redundancy of Folded Binary Code.
Naofumi Aoki
Published in:
NCM (2009)
Keyphrases
</>
binary codes
data embedding
hamming distance
speech recognition
gray code
similarity search
speech signal
data sets
hash functions
pattern recognition
lossless compression
secret data